• DocumentCode
    257266
  • Title

    A taxonomy and comparison of remote voting schemes

  • Author

    Huian Li ; Kankanala, Abhishek Reddy ; Xukai Zou

  • Author_Institution
    Dept. of Comput. & Inf. Sci., Purdue Univ., Indianapolis, IN, USA
  • fYear
    2014
  • fDate
    4-7 Aug. 2014
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    Remote voting has been an active research field for application of cryptographic techniques in the last two decades with many schemes and systems in publication. In this paper we present an overview of recent efforts in developing voting schemes and security models that involve a variety of real world constraints to ensure election integrity. We classify voting schemes based on their primary cryptographic techniques. We analyze recent typical schemes and systems against the basic and counter attack requirements with brief description. Such analysis shows difference among these security requirements and aids in design of future schemes. Our conclusion is provided regarding suitability of a particular voting system/scheme under various conditions.
  • Keywords
    cryptography; government data processing; counter attack requirements; cryptographic techniques; election integrity; primary cryptographic techniques; real world constraints; remote voting schemes; security models; security requirements; Electronic voting; Encryption; Nominations and elections; Protocols; Public key; Cryptography; Electronic voting scheme; Privacy; Protocol; Remote voting;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Communication and Networks (ICCCN), 2014 23rd International Conference on
  • Conference_Location
    Shanghai
  • Type

    conf

  • DOI
    10.1109/ICCCN.2014.6911807
  • Filename
    6911807